Multi-image steganography and authentication using crypto-stego techniques

H Sharma, DC Mishra, RK Sharma, N Kumar - Multimedia Tools and …, 2021 - Springer
It is a necessity to protect sensitive information in digital form from an adversary who may
indulge in cyber-crimes such as modification, masquerading, and replaying of data. Security …

Secure image steganography using cryptography and image transposition

K Muhammad, J Ahmad, M Sajjad, M Zubair - arXiv preprint arXiv …, 2015 - arxiv.org
Information security is one of the most challenging problems in today's technological world.
In order to secure the transmission of secret data over the public network (Internet), various …

Implementation of hybrid cryptography in steganography for augmented security

V Kalaichelvi, PV Devi, S Hemamalini… - … and Systems for …, 2023 - ieeexplore.ieee.org
Now-a-days, many billions and trillions of data exchanged over the internet per second.
Ensuring the security of data is a major priority in the realm of information technology. To …

Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

A review of forensic approaches to digital image Steganalysis

S Chutani, A Goyal - Multimedia Tools and Applications, 2019 - Springer
Abstract Traditional or Binary Steganalysis brands a digital object such as an image as
stego or innocent only but modern day information security requires deeper insight about the …

A steganographic method for images by pixel-value differencing

DC Wu, WH Tsai - Pattern recognition letters, 2003 - Elsevier
A new and efficient steganographic method for embedding secret messages into a gray-
valued cover image is proposed. In the process of embedding a secret message, a cover …

Digital image steganography: challenges, investigation, and recommendation for the future direction

AA Abdulla - Soft Computing, 2023 - Springer
Performance measurements which characterize digital image steganography techniques
include payload capacity, stego image quality, and security (secret message detectability) …

Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons

A Gutub, F Al-Shaarani - Arabian Journal for Science and Engineering, 2020 - Springer
The protection of confidential information transmitted over the Internet and restricting access
to specific classified data have become a major security and privacy issue. To conceal the …

[PDF][PDF] Secure steganography for digital images

KF Rafat, MJ Hussain - … Journal of Advanced Computer Science and …, 2016 - academia.edu
The degree of imperceptibility of hidden image in the 'Digital Image Steganography'is mostly
defined in relation to the limitation of Human Visual System (HVS), its chances of detection …

Novel secure hybrid image steganography technique based on pattern matching

A Hamza, D Shehzad, MS Sarfraz… - KSII transactions on …, 2021 - koreascience.kr
The secure communication of information is a major concern over the internet. The
information must be protected before transmitting over a communication channel to avoid …